drucken bookmarks versenden konfigurieren admin pdf Sicherheit: Mangelnde Rechteprüfung in Ceph
Name: |
Mangelnde Rechteprüfung in Ceph |
|
ID: |
USN-7182-1 |
|
Distribution: |
Ubuntu |
|
Plattformen: |
Ubuntu 22.04 LTS, Ubuntu 24.04 LTS, Ubuntu 24.10 |
|
Datum: |
Mo, 6. Januar 2025, 23:12 |
|
Referenzen: |
https://launchpad.net/ubuntu/+source/ceph/19.2.0-0ubuntu0.24.04.2
https://launchpad.net/ubuntu/+source/ceph/17.2.7-0ubuntu0.22.04.2
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-48916 |
|
Applikationen: |
Ceph |
|
Originalnachricht |
This is an OpenPGP/MIME signed message (RFC 4880 and 3156) --===============3579257516107653798== Content-Language: en-US Content-Type: multipart/signed; micalg=pgp-sha256; protocol="application/pgp-signature"; boundary="------------aJAPcsP00a64D7HrOcZJ2NM6"
This is an OpenPGP/MIME signed message (RFC 4880 and 3156) --------------aJAPcsP00a64D7HrOcZJ2NM6 Content-Type: multipart/mixed; boundary="------------Qu70b1iDy0UhXUgoF0vsVUtv"; protected-headers="v1" From: Hlib Korzhynskyy <hlib.korzhynskyy@canonical.com> Reply-To: security@ubuntu.com To: ubuntu-security-announce@lists.ubuntu.com Message-ID: <b2ed640a-6431-4a4d-842e-64f22e2c788b@canonical.com> Subject: [USN-7182-1] Ceph vulnerability
--------------Qu70b1iDy0UhXUgoF0vsVUtv Content-Type: text/plain; charset=UTF-8; format=flowed Content-Transfer-Encoding: base64
========================================================================== Ubuntu Security Notice USN-7182-1 January 06, 2025
ceph vulnerability ==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 24.10 - Ubuntu 24.04 LTS - Ubuntu 22.04 LTS
Summary:
Ceph could allow unintended access to network services.
Software Description: - ceph: distributed storage and file system
Details:
It was discovered that Ceph incorrectly handled unsupported JWT algorithms in the RadosGW gateway. An attacker could possibly use this issue to bypass certain authentication checks and restrictions.
Update instructions:
The problem can be corrected by updating your system to the following package versions:
Ubuntu 24.10 ceph 19.2.0-0ubuntu2.1 ceph-base 19.2.0-0ubuntu2.1 ceph-common 19.2.0-0ubuntu2.1 radosgw 19.2.0-0ubuntu2.1
Ubuntu 24.04 LTS ceph 19.2.0-0ubuntu0.24.04.2 ceph-base 19.2.0-0ubuntu0.24.04.2 ceph-common 19.2.0-0ubuntu0.24.04.2 radosgw 19.2.0-0ubuntu0.24.04.2
Ubuntu 22.04 LTS ceph 17.2.7-0ubuntu0.22.04.2 ceph-base 17.2.7-0ubuntu0.22.04.2 ceph-common 17.2.7-0ubuntu0.22.04.2 radosgw 17.2.7-0ubuntu0.22.04.2
In general, a standard system update will make all the necessary changes.
References: https://ubuntu.com/security/notices/USN-7182-1 CVE-2024-48916
Package Information: https://launchpad.net/ubuntu/+source/ceph/19.2.0-0ubuntu2.1 https://launchpad.net/ubuntu/+source/ceph/19.2.0-0ubuntu0.24.04.2 https://launchpad.net/ubuntu/+source/ceph/17.2.7-0ubuntu0.22.04.2
--------------Qu70b1iDy0UhXUgoF0vsVUtv--
--------------aJAPcsP00a64D7HrOcZJ2NM6 Content-Type: application/pgp-signature; name="OpenPGP_signature.asc" Content-Description: OpenPGP digital signature Content-Disposition: attachment; filename="OpenPGP_signature.asc"
-----BEGIN PGP SIGNATURE-----
wsF5BAABCAAjFiEELOLXZEFYQHcSWEHiyfW2m9Ldu6sFAmd8FlUFAwAAAAAACgkQyfW2m9Ldu6tL QA/+LvCXvPPlKrkztGkYV8Tb5qY4E0iCPsiFd6dtp0grUEpFZDmXOuodXXGEiQ32yiYRNaNOYGDu dGthothfUIMs9G+BavYGW9lbNCj9SLwxnDF5McNni1zYAtMbTjgjMiU0BeTB44UP2B1UJ3ZoP/y0 s0WGrGXAjlK+aJ99smcJ8OJlldHyHdvfQGIMoJJYCoZQM8zWs1s4BtMXNplpjflbbzqdAXFssnCN 8on/2RBlwk7u1OatVFBE9os/0jsp3o+DF2W3KNs+Tlt1pE6kijUN3DUJN2qH8d1QpULLZCH1h6+N um9MckdTE76mtu8iKzvugdFjdLuYT8OFLdXkFo4KgXeMuIMmQbck8ofMA3uFq7GUX8qnSbP6w+0Q gv/Mz4YleOLV/eDRMX1hhlz1UtKbmxQE3m4HWYgvuXCWpFmpBJdSbclC0juGx5vpPHZyN3ep6Wsx dzRSNkX9rqSt1aU8rFzNYOzSDwCWbCr1xGOHN+wxjTKOhiEAYNCF1/SdIXWmXKelg/YMq+WipH6+ 6uNEaq5+1WL/FS/vgobrnUbVjQwx+jLxsxQdYHzxl5vCv1BEPoHxdbswNzIp3SFDkgu19drYsYED BLfKJUAeFYJAGI61fLZHPXEgxUZEP76kxsjx3YQqa3aHRa68nD59MB+4pddUxqXGmgm8W8RD/kuL xpo= =9qNK -----END PGP SIGNATURE-----
--------------aJAPcsP00a64D7HrOcZJ2NM6--
--===============3579257516107653798== Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: base64 Content-Disposition: inline
Cg==
--===============3579257516107653798==--
|
|
|
|